I can explain how it got there, but not really why.Radar1968 wrote:Can anyone explain why the Evas!on iOS jailbreak tools are now on the Clamav virus signature list?
Radar1968 wrote:GarageBuy_2.1.5.dmg: Osx.Exploit.Iosjailbreak FOUND
mac_pilot_lite.dmg: Osx.Exploit.Iosjailbreak FOUND
mac_pilot.dmg: Osx.Exploit.Iosjailbreak FOUND
mac_pilot4.3.2.dmg: Osx.Exploit.Iosjailbreak FOUND
~/Library/Application Support/Google/Chrome/Default/File System/000/t/00/00000000: Osx.Exploit.Iosjailbreak FOUND
I'm certain they are all false positives since even the target file is not capable of impacting OS X.infinitesimal wrote:I have detected 'Osx.Exploit.Iosjailbreak' in about a dozen places on my various machines and drives.
Thanks, but what I really need is for you to submit a couple of those files to ClamAV, otherwise this will continue to be a problem for users.Radar1968 wrote:OK, so I have conducted my tests and am pretty certain its an FP.
This signature was dropped a couple days ago, and beyond that, users can ignore it on their end.
Users browsing this forum: dgkanter